Update management

Information

  • Patent Grant
  • 9754096
  • Patent Number
    9,754,096
  • Date Filed
    Thursday, October 2, 2014
    10 years ago
  • Date Issued
    Tuesday, September 5, 2017
    7 years ago
Abstract
A method for providing an update package to a node in a mesh network comprising a set of nodes and a gateway node arranged to provide access to an update server via a second network. The gateway node collects package information from each set node, including a first node. Each package identifies a respective node and its package version. The gateway node may query the update server based on the package information. The update server may respond to the gateway node with an updated package for the first node. The gateway node broadcasts the updated package into the mesh network as a sequence of mesh messages. Each of a first plurality of nodes of the set may forward the mesh messages to other nodes. The first node stores the mesh messages so as the sequence of mesh messages is received, assemble the updated package.
Description
CROSS REFERENCE TO RELATED APPLICATIONS

This non-provisional patent application claims priority to Great Britain applications: GB 1412719.5, filed Jul. 17, 2014; GB 1405790.5, filed Mar. 31, 2014; GB 1403314.6, filed Feb. 25, 2014; GB 1405785.5, filed Mar. 31, 2014; GB 1405786.3, filed Mar. 31, 2014; GB 1405789.7, filed Mar. 31, 2014; GB 1403312.0, filed Feb. 25, 2014; GB 1405791.3, filed Mar. 31, 2014; GB 1405797.0, filed Mar. 31, 2014.


TECHNICAL FIELD

This invention relates to a system and method for updating data at a node in a mesh network.


BACKGROUND OF THE INVENTION

Wireless mesh networks are an example of an ad hoc network in which each device can relay data on behalf of other devices in the network. A pair of devices in a mesh network might not be able to communicate directly with one another. Instead, communications between the pair of devices can be supported by one or more other devices in the mesh network which act to relay data from one device of the pair to the other. In such mesh networks, a connection between a given pair of devices can be intermittent and short-lived due to intermediate devices supporting the connection moving in and out of the signal range of adjacent devices, interference, and those intermediate devices entering low power states.


These issues are compounded when the device wishing to communicate over the wireless mesh network is itself subject to power restrictions. Such devices, which can include ultra-low power devices intended to run for many years on a single battery, may themselves spend a significant proportion of time in a low power state in which communication is not possible or in which the device is configured to respond only to certain network packets (e.g. those for which it is the endpoint). Low power devices may only achieve sporadic connectivity to resources in the network, which can make it difficult for those devices to perform functions that are typically enabled by network connectivity, such as downloading software updates and performing data backups to a remote location.


Enabling devices to update their software can allow the function set of a device to be changed without requiring that the physical device is replaced. For example, a software update can provide new functionalities and bug fixes to a device. This can be advantageous even for the most low-power devices.


Devices in mesh networks often present difficulties to the usual approaches for performing software updates. For example, nodes in mesh networks can suffer from unreliable connections and are limited by the small size of data packets typically transported over the network. These difficulties generally include the problems discussed above for low power devices suffering from intermittent connectivity to a mesh network. Software updates can be a particular problem when the mesh network represents an “Internet of Things” because devices on such mesh networks can be inaccessible to a user (such as a light controller embedded in a wall) and may often not present any kind of interface accessible to the user (preventing actions such as a physical reset).


There is a need for a robust update mechanism for devices operating in mesh networks which allows very low power devices with potentially intermittent access to the network to be reliably updated.


BRIEF SUMMARY OF THE INVENTION

According to a first aspect of the present invention there is provided a method for providing an update package to a node in a mesh network comprising a set of nodes and a gateway node arranged to provide access to an update server by means of a second network, the method comprising: the gateway node collecting data package information from each of the set of nodes including a first node, each data package information instance identifying a respective node and its data package version; using the data package information, the gateway node querying the update server by means of the second network so as to cause the update server to respond to the gateway node with an updated data package for at least the first node; the gateway node broadcasting the updated data package into the mesh network as a sequence of first mesh messages carrying an identifier of the first node; and on receiving a first mesh message: each of a first plurality of nodes of the set, including the first node, scheduling one or more operations to forward the first mesh message to other nodes of the set; and the first node additionally storing the first mesh message so as to, as the sequence of first mesh messages is received, assemble the updated data package.


The gateway node may broadcast each of the sequence of first mesh messages into the mesh network more than once.


The gateway node may periodically broadcast each the sequence of first mesh messages into the mesh network for a predetermined period of time.


The gateway node may collect data package information from the first node by broadcasting an information request into the mesh network and in response receiving the data package information from the first node.


The gateway node may collect data package information from the first node by receiving the data package information as an unsolicited broadcast by the first node into the mesh network.


The data package information may indicate the type of each node in the set and, on collecting the data package information, the gateway node may: identifying a plurality of nodes of the set of the same type; defining a first group identifier for that plurality of nodes; and broadcasting the first group identifier into the mesh network such that each of the plurality of nodes becomes associated with the first group identifier.


The plurality of nodes may include the first node and the sequence of first mesh messages may represent the updated data package each including the first group identifier as the identifier of the first node.


The method may further comprise a second plurality of nodes of the set caching mesh messages and, on the first node identifying a missing message in the sequence of first mesh messages it has received, the first node may broadcast a missing message request into the mesh network so as to cause one of the second plurality of nodes of the set to respond with a cached copy of the missing message.


Each first mesh message may include a first parameter representing a first time period for which that first mesh message is to persist in the mesh network, and each of the second plurality of nodes may discard a first mesh message from it cache once the first time period is determined to have elapsed for that message.


The first parameter may indicate one or more of: a time when the respective message expires; a period of time as measured from a timestamp of the respective message; a remaining period of time for which the respective message is to persist from its time of reception at a node.


The first node may, on receiving a first mesh message, not transmit to the gateway node a message acknowledging receipt of the mesh message.


The set of nodes of the mesh network may authenticate received mesh messages using a security key common to the nodes of the mesh network.


The method may further comprise, on completing assembly of the updated data package, the first node entering an update mode and applying the updated data package.


Prior to entering its update mode, the first node may verify the updated data package using a checksum received with the updated data package.


The gateway node may broadcast the sequence of first mesh messages into the mesh network at a rate calculated in dependence on: an amount of storage available in the mesh network for caching mesh messages; and a first time period for which each first mesh message is to persist in the network.


The updated data package may comprise one or more of firmware for the first node, configuration information for the first node, operating parameters for the first node, a dataset for use at the first node, and code for execution at the first node.


According to a second aspect of the present invention there is provided a system for providing an update package to a node in a mesh network, the system comprising: a set of nodes of the mesh network, the set including a first node and a gateway node; the gateway node being operable to communicate over a second network and to collect data package information from each of the set of nodes, each data package information instance identifying a respective node and its data package version; and an update server accessible over the second network; the gateway node being configured to: using the data package information, query the update server by means of the second network so as to cause the update server to respond to the gateway node with an updated data package for at least the first node; and broadcast the updated data package into the mesh network as a sequence of first mesh messages carrying an identifier of the first node; and on receiving a first mesh message: each of a first plurality of nodes of the set, including the first node, scheduling one or more operations to forward the first mesh message to other nodes of the set; and the first node additionally storing the first mesh message so as to, as the sequence of first mesh messages is received, assemble the updated data package.





BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will now be described by way of example with reference to the accompanying drawings. In the drawings:



FIG. 1 is a schematic diagram illustrating a system for updating a node in a wireless network; and



FIG. 2 illustrates a system and message flow for distributing an update package within an exemplary system.





DETAILED DESCRIPTION

The following description is presented by way of example to enable any person skilled in the art to make and use the invention. The present invention is not limited to the embodiments described herein and various modifications to the disclosed embodiments will be readily apparent to those skilled in the art.


There is provided a system for updating data at a node in a mesh network, such as the firmware of the node, its application-ware or its configuration. The system is described herein by way of example with reference to the Bluetooth Smart mesh network in which nodes are referred to as “Things”. The second network could be any kind of network, including a wired or wireless network. In the examples described herein the second network provides access to the internet. The gateway or “hub” could be any suitable device operable to span the two networks, including a personal computer running appropriate software, an internet router, a smartphone or tablet, or any kind of network-enabled appliance such as a television, refrigerator or washing machine.



FIG. 1 is a schematic diagram illustrating a system 100 for updating a node in a mesh network. The system includes a wireless mesh network 101 comprising a set of nodes 102, 103, 104, 105, 106, 107 and 115. These nodes are operable to communicate with one another by means of Bluetooth Low Energy. The range over which each node can communicate may be limited, for example, by their available power, interference affecting the communication channel(s) used, and the physical environment in which the nodes operate. Nodes having limited power may reduce the amount of time for which they listen for mesh messages/are available to receive mesh messages. Thus, in the snapshot of network 101 shown in FIG. 1, node 107 can communicate directly with nodes 102, 105 and 115, but it cannot communicate directly with node 106. Data exchanged between nodes 106 and 107 over the mesh network may be relayed via at least one intermediate node, such as via node 105. In this example, node 106 can only communicate directly with node 105 and any communications with node 106 over the mesh may therefore be relayed by node 105. The nodes directly accessible to any given node in the mesh network is likely to change over time as adjacent nodes move in and out of range of one another, as nodes enter low power states, and when the physical or radio environment of the nodes changes. The mesh network 101 could have any suitable topology.


In FIG. 1, node 102 is a gateway device and nodes 103-107 and 115 are “Things”, which could be consumer devices around the home. For example, Thing 106 could be a lightbulb coupled with Bluetooth Low Energy (BLE) connectivity so as to allow the lightbulb to be controlled (e.g. in terms of its colour, luminosity) over the mesh network. Things 103-105 could be devices such as a refrigerator, light switch, dustbin, door entry pad, thermostat etc. which are similarly equipped with Bluetooth Low Energy connectivity. Gateway device 102 is configured to operate both on the mesh network 101 and on a second network 108, which in this case is the internet. For example, the gateway device could be a smartphone equipped with BLE connectivity and connectivity to the internet could be by means of its integrated cellular modem or an IEEE 802.11 radio to allow the smartphone to establish a WiFi connection 109 (e.g. to an internet-connected router, not shown in FIG. 1). In other examples, connectivity to the second network could be provided in accordance with any other communication protocol. In another example, the gateway device could be a WiFi-enabled appliance such as a refrigerator or television which is also equipped with BLE connectivity adapted for connection to mesh network 101. A mesh network can include more than one gateway device.


Gateway device 102 may be any of a variety of different types of devices (e.g, it may be a dedicated gateway device for a mesh network and not provide any further functionality). Typically, however, gateway device 102 may not be subject to severe power restrictions—for example, it could be mains-powered (such as an internet router or refrigerator), or it might be a portable device such as a smartphone, tablet or laptop which is frequently recharged by the user. At least some of the nodes could be ultra-low power devices. For example, node 115 could be a battery-powered dustbin sensor arranged to run on the same battery for many years and configured to transmit an indication to a local council indicating when the bin is full and needs emptying. The dustbin sensor would transmit its “bin full” indication into the mesh network for communication to the gateway 102 which provides access to the internet 108 for the mesh network. In this case, node 107 is in the range of BLE transmissions of the dustbin and would first receive the mesh message carrying the “bin full” indication. Node 107 would then propagate that message onto gateway 102. Since the “bin full” indication would be directed to a local council server accessible over internet 108, the gateway device 102 would forward the indication over link 109 to the internet.


Other Things on the mesh network 101 might have different power restrictions—for example they could be solar powered, or only receive power when the device is used (e.g. an occasionally-used kitchen appliance).


System 100 further comprises an update server 110 which is arranged to provide update packages for nodes of the mesh network. The update server could provide a “cloud service” so as to allow a node to receive updates by means of the internet 108. More generally, the update server could be accessible over any kind of network to which the gateway device has access, including a home or business network to which update server 110 is connected. An update package available at server 110 for a node could be firmware for the node, the firmware potentially being, for example, a new firmware version, replacement firmware for a current version, or an old firmware version (e.g. where rollback of node firmware is required).


Firmware can be any kind of code for execution at the node including, for example, application-ware (e.g. custom application code for execution at the node in an execution context provided by lower-level firmware) and low-level firmware (e.g. a kernel providing basic node functionality, such as radio communications and defining a software environment in which application-ware can be executed). An update package could alternatively or additionally include configuration information for the node (e.g. a saved configuration for a light switch thing), operating parameters for the node (e.g. calibration parameters for a thermostat thing), a dataset for use at the node (e.g. an encrypted list of allowed entry codes for a door entry pad), and code for execution at the node (e.g. an application for execution at a refrigerator to provide a diary information on its display screen).


A first example will now be described with reference to FIG. 2, which shows a possible flow of messages between the elements of the system of FIG. 1. In this example, mesh network 101 is a network of consumer devices in a home, Thing 106 is a lightbulb and the gateway 102 is a laptop with BLE and WiFi functionality which can execute software configured to cause the laptop to operate as a gateway device for BLE mesh network 101. The software could be configured to periodically run as a service at the laptop in order to perform the update mechanism described below. The WiFi functionality of the laptop allows the laptop to communicate over internet 108 by means of an internet router (not shown in FIG. 1).


Lightbulb 106 operates according to firmware stored at the thing and adapted for execution at a processor 210 (typically a low power system-on-chip processor). The firmware defines various functions associated with the operation of the lightbulb (e.g. routines for turning on and off the light, controlling its colour temperature etc.) and the operation of the Thing as a node within BLE mesh network 101 (e.g. routines defining BLE messaging protocols, performing firmware updates). In this example, the firmware is provided in two parts: low level firmware 203 which defines a software environment, and higher-level application-ware (or “appware”) 201 for running in that software environment. In the present example it is the appware which is updated, but more generally it could be any aspect of the firmware or data held at Thing 106. The appware includes routines for controlling the operation of the lightbulb, such as routines for turning on and off its light source according to a defined schedule, and routines for controlling the colour temperature of the lightbulb. Lightbulb thing 106 is provided with a Bluetooth radio 212 by means of which the thing communicates over mesh network.


Gateway device 102 is in this example a laptop comprising a memory 206 and a CPU 211. Laptop 102 supports an update agent 207 which is software configured to perform aspects of the update mechanism described herein so as to update the appware at Thing 106. Laptop 102 comprises a Bluetooth radio 213 by means of which it communicates over BLE mesh network 101, and a WiFi radio 214 by means of which it communicates over the internet 108. The gateway device functionality, including update agent 207 and the necessary routines to cause the laptop to behave as a gateway device in mesh network 101, can be provided at the laptop as software running at the CPU 211.


Update server 110 is in this example a cloud server accessible over the internet 108 and comprising a processor 215, memory 216 and a network interface 217 adapted to couple the server to the internet. Server 110 includes an update manager 218 for supporting communications with update agent 207 at mesh network 101. The update manager would typically be software running at processor 215. Two data stores are supported at or accessible to the server: a device registry 208 and a package repository 209. In other examples, the server could support one or more data stores collectively storing data packages and information identifying the devices or device types to which each data package relates.


Device registry 208 comprises identifiers for the things at mesh network 101, with each identifier being a unique string and/or key set at the thing during manufacture (in practice, each identifier may be an identifier of the BLE chip provided at a thing so as to permit that thing to operate in a mesh network, and the identifier may be set during manufacture of the BLE chip). The identifier could be a Bluetooth UUID and public key. Package repository 209 comprises firmware packages for one or more things in the mesh network, along with data indicating the target hardware for each firmware package (e.g. an identifier of the chip type to which the firmware relates). The package repository could be kept up to date by the manufacturers of the things such that new firmware can be made available at the repository when it is released by the manufacturer. The device registry can be maintained by the entity generating the unique identifiers for the things, e.g. the manufacturer of the BLE chip might post new identifiers and/or keys into the registry as new chips are manufactured and identifiers allocated to them.


It is to be understood that the representations of the thing, gateway device and server in FIG. 2 are merely schematic. For example, server 110 might in fact represent one or more servers operating together (e.g. a federation of servers), and the device registry and package repository could be provided as a single entity.


Laptop 102 is unlikely to be permanently powered and running in the home in which mesh network 101 is provided. Furthermore, the software at laptop 102 for providing the gateway functionality may not always be running when the laptop is powered—for example, the software may only run periodically as a service, or may only run when the user chooses to load the software and access the mesh network (e.g. to configure a schedule for turning a light source at lightbulb 106 on and off). This may mean the mesh network is provided with only sporadic access to the internet by means of the gateway device. There could be more than one gateway operating in the local network (e.g. more laptop 102 and a smartphone running appropriate software).


At least some of the nodes in the mesh network may be able to (though may not always be configured to) forward messages that are directed to other node(s) in the mesh through the scheduling of mesh messages broadcasts. Such forward operations could be scheduled periodically (e.g. to cause the node to periodically re-broadcast a mesh message) or at particular times when other nodes are known to be listening. The scheduling of a mesh message forwarding operation need not be for a particular future time; it could instead be in response to a condition of the mesh network being satisfied, e.g. a node becoming available on the network (a node could indicate its availability by broadcasting a suitable mesh message), or in response to a message being received from another node. This allows messages to reach nodes which, when those messages started out, were not at that instant accessible over the mesh network. In other words, messages can permeate through the mesh network even when a complete data path is not available at that instant from message source to endpoint, with the messages passing between nodes as and when communication becomes possible between those nodes. Broadcast messages can carry expiry information such that those messages are passed about the mesh network for some defined period of time, but after that period of time are discarded. In this manner, messages can persist for sufficient time in the mesh for the intended endpoint of a message to receive it. Security can be enforced in the mesh through the use of a common security key: in order to join the mesh network each node can be provided with the security key. The key could be used to encrypt/decrypt mesh messages.


This will now be illustrated by way of example with respect to FIG. 1. Consider that lightbulb 106 wants to send a mesh message to gateway 102. The lightbulb broadcasts that mesh message into the mesh, with the mesh message carrying an identifier of the gateway so as to allow nodes receiving the message to determine whether the message is intended for it or another node. In this case, node 105 is first to receive the mesh message. Since the message is not for node 105, the node schedules an operation to re-broadcast it into the mesh network—in this case onto nodes 107, 104 and 106, which may not be immediately available. Node 105 could be configured to provide its cached copies of mesh messages to nodes 104, 106 and 107 when they are next available in the mesh. In turn, node 107 schedules an operation to re-broadcast the message onto node 115 and gateway 102. This scheduling of re-broadcasts of a received message can be referred to as “forwarding” or “cache and forward” since some caching of the received message is generally performed. Node 115 is an ultra low power device configured to not cache and forward messages; since the mesh message is not directed to node 115 it therefore discards the message. Gateway 102, however, recognises that the mesh message is intended for it and accepts the message without caching and forwarding (unless the message is also intended for other nodes, e.g. a group of nodes to which the gateway belongs). Gateway 102 may also receive a copy of the message via nodes 104 and 103. The later-received copy can be discarded by the gateway. The gateway could broadcast an acknowledgement into the mesh indicating that it has received the message. That acknowledgement can similarly permeate through the mesh and can serve two purposes: firstly, it can indicate to the lightbulb that the message has been received; and secondly, it can indicate to the other nodes in the mesh that the cached copy of the original message from lightbulb 106 can be discarded.


It will be appreciated that as a result of changes in connectivity within the mesh network, lightbulb 106 may only be able to sporadically access the gateway device and hence internet 108. Such accesses may be short-lived and, to cope with potentially severe energy restrictions at the lightbulb, may be performed at very low power. It is however desirable for even low power things in a mesh network to be able to automatically receive firmware updates. This allows those things to be provided with new or updated functionalities and bugs to be fixed without requiring that the hardware itself is replaced. A low power, opportunistic mechanism is required by which things such as lightbulb 106 can update their firmware or other data.



FIG. 2 sets out a mechanism by which lightbulb 106 can update its firmware by means of mesh network 101. Gateway 102 is configured to broadcast a package version request 250 into the mesh 101 so as to cause the nodes in the mesh to respond with information defining their identity and data package version. As discussed, data package version information could be a firmware version, application-ware or “appware” version, current configuration version information etc. In the present example, lightbulb 106 broadcasts its response 251 into the mesh which carries an identifier of the lightbulb (e,g, its manufacturer and model number, or its unique Bluetooth ID) and the current version of its appware. The gateway could receive any kind of identifier for the thing on the basis of which it can identify an appropriate update package for the thing at server 110. For example, the identifier could be an identifier of the type of device and its current firmware but not be unique to the device. A node may be configured to respond to a package version request only if it is in a position to update its firmware, for example if its battery charge exceeds some predefined level.


In alternative examples, lightbulb 106 is configured to from time to time broadcast a mesh message carrying its identity and appware version into the mesh network without being solicited by gateway 102.


As a gateway device, node 102 collects the responses from the nodes in the mesh, including response 251 from lightbulb 106. Armed with the appware version of thing 106 and its identity, update agent 207 of gateway 102 can then proceed to query update server 110 by means of the internet and it's WiFi radio 214. This query can be performed at any convenient point, e.g. the next time gateway device 102 achieves a connection to the internet, or when a user of the gateway device chooses to check for updates for things at the mesh network. Update agent 207 queries the update manager 218 operating at the update server by transmitting query message 252 which carries information identifying thing 106 and its appware version.


On receiving the query 252, the update manager consults device registry 208 using the information identifying thing 106 (e.g. its model number) and its current appware version in order to identify whether updated appware is available for the lightbulb. In this case updated appware v1.3 is available for the lightbulb and is retrieved from package repository 209 and transmitted in data packet(s) 253 by the update manager 218 to gateway 102. The update package could be encoded so as to ensure the update is used only by the intended thing 106—for example, the update package could be encrypted using a public key of thing 106 known to the device registry. Gateway device 102 stores the firmware package at its memory 206. The update package could also be signed by the update server with the private key of an asymmetric keyset associated with the server. The public key of the server can be provided to the mesh network and hence known to the mesh node and/or the gateway so that the source of the update package can be verified at the gateway before it is broadcast into the mesh and/or by the node before the update is applied. This can avoid the injection of rogue updates into the mesh.


By arranging that the gateway discovers the firmware on behalf of the thing and then downloads (and potentially verifies the signature of) that firmware, the gateway can perform these energy-intensive operations which require a reliable connection to the update server. Given the small message size typically used in mesh network 101, in order to pass the downloaded firmware to the thing, the gateway performs segmentation of the update package into a sequence of mesh messages. These messages are broadcast into the mesh according to the mesh network protocols such that the lightbulb can build up (potentially over some time) the update package from the data segments. One or more of the mesh messages may include a checksum or other means for verifying the integrity of the received update package.


If updated firmware is not available, the update manager indicates this to the gateway device. Preferably the update agent at the gateway device does not transmit this information into the mesh network 101 so as to avoid causing the mesh nodes to expend unnecessary energy receiving and parsing that information.


Update packages received at the gateway are stored at the gateway's package cache 205 so as to allow subsequent dissemination of the update package data without requiring the gateway to maintain a connection to the update server. Once the gateway holds the update package for lightbulb 106, it can begin to communicate the update package to the lightbulb by broadcasting the update package as a sequence of mesh messages 254 into the mesh network 101. Due to the small size of mesh messages, typically an update package may be segmented by the gateway into many small mesh messages, each carrying a portion of the update package in their payload data. This segmentation could be performed at the gateway or at the server. If it is performed at the server, the gateway could be configured to push into the mesh (possibly with minor protocol processing, such as inserting sequence numbers into the messages) mesh messages carried in the payload of data packets received from the server (e.g. TCP/IP or UDP data packets).


Each mesh message of the sequence includes an identifier of lightbulb 106. This could be an identifier specific to the lightbulb, such as its Bluetooth ID, or a group identifier for a group to which the lightbulb belongs. The identifier need not be used to route the mesh message since the mesh network may employ very limited message routing, but the identifier does allow the lightbulb to identify when it receives a mesh message which is directed to it.


It is advantageous if the node(s) to which an update mesh message is intended additionally forward the message onto other nodes of the mesh network. This helps ensure that the sequence of mesh messages reach all parts of the mesh network and allows the same mesh messages to be used to update multiple nodes of the mesh network.


The gateway can be configured to define groups of nodes on collecting responses 251 from the nodes of the mesh network which carry the identity and version information of the nodes. On identifying more than one node being of the same type and having the same package version (e.g. the same appware version), the gateway could define a group for those nodes and cause those nodes to be associated with the group. The gateway could, for example, broadcast a mesh message into the mesh indicating to those nodes that they belong to the group and should therefore be responsive to mesh messages directed to that group. For example, nodes 104, 105 and 106 could all be lightbulbs of the same model and having the same appware version, with gateway 102 defining a group “lightbulb_1”. Since in many cases all of the lightbulbs would receive the same update package, allowing the gateway to address an update package to all of the bulbs of the group minimises the amount of data injected into the mesh network and hence the amount of work nodes of the network (which may be very low power devices) do in relaying update messages around the network to their intended destination.


As indicated by arrow 255 in FIG. 2, gateway 102 preferably broadcasts into the mesh each of the sequence of mesh messages carrying the update package for node 106 more than once. The gateway could be configured to start broadcasting subsequent messages in the sequence into the mesh before it has completed broadcasting the current mesh message. This can increase the likelihood that the mesh messages reach their lightbulb. For example, each mesh message could be periodically pushed into the mesh network at some predefined interval for some predefined time or until an acknowledgement for that message is sent through the mesh from the lightbulb, with the gateway then moving onto the next mesh message and periodically pushing that message into the mesh. The lightbulb need not however acknowledge the messages it receives carrying its package update. This minimises energy expenditure at the lightbulb.


The gateway could be configured to transmit the sequence of mesh messages carrying an update package at a rate which depends on the total memory available at the nodes of the mesh network for caching mesh messages. This can help the gateway to avoid flooding the mesh network which push earlier messages out of the caches at the nodes before those messages have reached their intended destination. For example, the gateway could be configured to receive in messages 251 information about the memory available for caching mesh messages (since not all of the nodes necessarily choose to cache messages, the memory available might be less than the total memory capacity of the mesh network). Based on an expectation as to how long messages take to find their intended destination, the gateway could then determine the rate at which the sequence of messages should be pushed into the mesh network and/or the period according to which the broadcast of messages of the sequence should be repeated.


The sequence of mesh messages may travel via multiple nodes of the mesh network and on a variety of paths in order to reach lightbulb 106 from the gateway. This is indicated by the set of nodes 280 in FIG. 2. For example, sometimes the lightbulb 106 might receive messages in the sequence carrying the update package by means of nodes 103, 104 and 105 (see FIG. 1), and at other times the lightbulb might receive messages via nodes 107 and 105, with from time-to-time further paths being possible involving other nodes which are not shown in FIG. 1. At least some of the nodes in the mesh network are configured to cache and forward mesh messages which are not directed to that node. In this manner, nodes other than node 106 may (a) forward messages of the sequence to adjacent nodes and (b) cache messages of the sequence for transmission to nodes which subsequently enter communication range and/or request the cached message. This allows the messages to reliably propagate through the mesh and reach nodes which might be some distance from the gateway and only intermittently accessible via multiple intermediate nodes operating as message relays. Typically a node may cache a message for a length of time indicated in the message for which the message is to persist, or until the node runs out of storage and receives younger messages.


On receiving a mesh message directed to it (as determined from the identifier carried in each message), the lightbulb 106 may store that portion of the update package carried in the message for assembly into the complete update package. In the example shown in FIG. 2, the lightbulb stores each received update package portion (potentially after processing steps such as decompression or decryption) in a memory area 204 with an offset representing the position in the update package of the update package data portion. The sequence number or other data of the mesh message carrying that update package portion could indicate the offset of the update package portion. For example, each mesh message might carry a payload of, say, 16 bytes of compressed data and, in a header of the mesh message, data indicating the offset of the uncompressed payload data in the completed update package. The uncompressed payload of each mesh message in the sequence can then be stored at its indicated offset in memory area 204 such that, once all mesh messages making up the sequence carrying the update package have been received, the memory area 204 would hold the complete update package.


The mesh messages could comprise header information or other data identifying each mesh message of the sequence as being a mesh message carrying an update package.


This allows the lightbulb to distinguish received mesh messages that carry a portion of the update package from mesh message carrying other data.


Once the lightbulb has received all of the messages of the sequence and the complete data package is available, the lightbulb preferably verifies the integrity and, optionally, the signature of the downloaded data package. For example, the lightbulb could perform a checksum over the received data of the data package and compare that checksum to a checksum provided with the mesh messages. If the updated data package is successfully verified, the lightbulb enters its update mode, applies the updated appware and reboots.


On verifying the updated package, the lightbulb could broadcast an acknowledgement onto the mesh network directed to the gateway so as to inform the gateway that the update package has been successfully received; the gateway could then delete the package from its memory (or if the lightbulb belongs to a group, when the gateway has received an acknowledgement from all of the nodes of the group). In some embodiments, however, the lightbulb may not broadcast acknowledgements of successfully received messages or of the complete data package.


A node being updated (in this case lightbulb 106) may be configured to broadcast a missing message request when it determines that a message is missing from the sequence. For example, the missing message request could be triggered when the lightbulb receives a subsequent mesh message in the update sequence when it has not yet received an earlier mesh message in the sequence. It will be appreciated that many other trigger configurations are possible. The missing message request is broadcast into the mesh so as to cause any other node which has cached a copy of the missing message to transmit the missing message to the lightbulb. The missing message request is not directed to the gateway, although the gateway could potentially receive the request and respond with a copy of the missing message. This mechanism allows the collective memory of nodes in the mesh to fill any holes in the update package assembled by the lightbulb.


Since the lightbulb might belong to a group such that there are other nodes receiving the same update package, it can be advantageous for the lightbulb to both store the payload of each received mesh message in memory area 204 in which it is assembling the update package as well as caching a copy of the original mesh message such that it can respond to missing message requests received from other nodes of the group.


The broadcasting of messages in mesh networks should not be understood to require that messages are explicitly addressed to all nodes of the network; broadcasting messages in a mesh network makes those messages available to any node of the mesh which is listening so as to allow those messages to potentially reach all nodes of the network.


The thing, gateway, and server/database of FIG. 2 are shown as comprising a number of functional blocks. This is schematic only and is not intended to define a strict division between different logic elements. Each functional block can be provided in any suitable manner, including as discrete hardware or software entities, and as a single hardware entity/as a collection of software entities running at a processor. For example, the radio, processor and memory of the thing may be provided in a single integrated circuit running one or more firmwares adapted to provide the functionalities described herein.


The terms software and program code as used herein includes executable code for processors (e.g. CPUs and/or GPUs), firmware, bytecode, programming language code such as C, and modules for reconfigurable logic devices such as FPGAs.


The algorithms and methods described herein could be performed by one or more physical processing units executing software that causes the unit(s) to perform the algorithms/methods. Each physical processing unit could be any suitable processor, such as a CPU or GPU (or a core thereof), or fixed function or programmable hardware. The software could be stored in non-transitory form at a machine readable medium such as an integrated circuit memory, or optical or magnetic storage. A machine readable medium might comprise several memories, such as on-chip memories, computer working memories, and non-volatile storage devices.


The applicant hereby discloses in isolation each individual feature described herein and any combination of two or more such features, to the extent that such features or combinations are capable of being carried out based on the present specification as a whole in the light of the common general knowledge of a person skilled in the art, irrespective of whether such features or combinations of features solve any problems disclosed herein, and without limitation to the scope of the claims. The applicant indicates that aspects of the present invention may consist of any such individual feature or combination of features. In view of the foregoing description it will be evident to a person skilled in the art that various modifications may be made within the scope of the invention.

Claims
  • 1. A method for providing an update package to a node in a mesh network comprising a set of nodes and a gateway node arranged to provide access to an update server via a second network, the method comprising: receiving a data package information instance from each node of the set of nodes, each data package information instance identifying its respective node and a data package version of its respective node;querying, using each data package information instance, the update server;receiving an updated data package corresponding to the data package information instance in response to the query; andbroadcasting the updated data package into the mesh network as a sequence of mesh messages, each mesh message in the sequence carrying an identifier of its respective node, the sequence of mesh messages broadcast at a rate that is based at least in part on a total memory available from the set of nodes.
  • 2. The method of claim 1, further comprising: periodically broadcasting each sequence of mesh messages into the mesh network, each broadcast occurring over a predetermined period of time, wherein the predetermined period of time is based on the total memory available from the set of nodes.
  • 3. The method of claim 1, further comprising: broadcasting an information request into the mesh network to obtain the data package information instance from each of the one or more nodes.
  • 4. The method as claimed in claim 1, further comprising: receiving each data package information instance as an unsolicited broadcast by each of the one or more nodes into the mesh network.
  • 5. The method as claimed in claim 1, further comprising: identifying a first plurality of nodes of the set of a same type, wherein each data package information instance indicates a type of its respective node;defining a first group identifier for that first plurality of nodes; andbroadcasting the first group identifier into the mesh network such that each of the first plurality of nodes becomes associated with the first group identifier.
  • 6. The method as claimed in claim 5, wherein each sequence of mesh messages represents an updated data package, and one or more of the sequences of mesh messages includes the first group identifier as the identifier of its respective node.
  • 7. The method as claimed in claim 1, the gateway node broadcasting the sequence of mesh messages into the mesh network at a rate calculated in dependence on: an amount of storage available in the mesh network for caching mesh messages; anda first time period for which each mesh message is to persist in the network.
  • 8. The method as claimed in claim 1, the updated data package comprising one or more of firmware for one or more nodes, configuration information for the one or more nodes, operating parameters for one or more nodes, a dataset for use at one or more nodes, and code for execution at one or more nodes.
  • 9. A system for providing an update package to a node in a mesh network, the system comprising: a set of nodes of the mesh network, the set including a gateway node and a first plurality of nodes, the first plurality of nodes including at least a first node;the gateway node being operable to communicate over a second network and to collect data package information from each node of the set of nodes, each data package information instance identifying a respective node and its data package version; andan update server accessible over the second network;the gateway node being configured to: using the data package information, query the update server via the second network so as to cause the update server to respond to the gateway node with an updated data package for the first node; andbroadcast the updated data package into the mesh network as a sequence of mesh messages carrying an identifier of the first node, the sequence of mesh messages broadcast at a rate that is based at least in part on a total memory available from the set of nodes;
  • 10. The system of claim 9, wherein the mesh messages in the sequence of mesh messages are forwarded from each node in the set of nodes to one or more other nodes of the set of nodes based at least in part on respective identifiers of the mesh messages.
  • 11. The system of claim 9, wherein each of the plurality of nodes of the set, on receiving a mesh message of the sequence of mesh messages, does not transmit a message to the gateway node acknowledging receipt of the mesh message.
  • 12. The system of claim 9, wherein the first node, after assembling the updated data package, enters an update mode, and applies the updated data package.
  • 13. The system of claim 9, further comprising a second plurality of nodes of the set of nodes, the second plurality of nodes configured to cache mesh messages of the sequence of mesh messages; and wherein in response to a node in the set of nodes broadcasting a missing message request into the mesh network, one of the second plurality of nodes is to respond with a cached copy of a missing mesh message corresponding to the missing message request.
  • 14. The system of claim 13, wherein each mesh message includes a first parameter representing a first time period for which that mesh message is to persist in the mesh network; and wherein each node in the second plurality of nodes is to discard a mesh message from its cache when the first time period has elapsed for that mesh message.
  • 15. The system of claim 14, wherein the first parameter indicates one or more of: a time when the respective message expires; a period of time measured from a timestamp of the respective message; and a remaining period of time for which the respective message is to persist from its time of reception at a node.
  • 16. A gateway node for providing an update package to a node in a mesh network, and providing access to an update server via a second network, the mesh network comprising a set of nodes and the gateway node, the gateway node configured to: receive a data package information instance from each node of the set of nodes, each data package information instance identifying its respective node and a data package version of its respective node;query the update server using each data package information instance;receive an updated data package corresponding to the data package information instance in response to the query; andbroadcast the received updated package into the mesh network as a sequence of mesh messages, each mesh message in the sequence carrying an identifier of its respective node, the sequence of mesh message broadcast at a rate that is based at least in part on a total memory available from the set of nodes.
Priority Claims (9)
Number Date Country Kind
1403312.0 Feb 2014 GB national
1403314.6 Feb 2014 GB national
1405785.5 Mar 2014 GB national
1405786.3 Mar 2014 GB national
1405789.7 Mar 2014 GB national
1405790.5 Mar 2014 GB national
1405791.3 Mar 2014 GB national
1405797.0 Mar 2014 GB national
1412719.5 Jul 2014 GB national
US Referenced Citations (130)
Number Name Date Kind
6917974 Stytz et al. Jul 2005 B1
6986046 Tuvell et al. Jan 2006 B1
7522540 Maufer Apr 2009 B1
7778270 Zhang et al. Aug 2010 B1
7787427 Simon et al. Aug 2010 B1
8495618 Inbaraj et al. Jul 2013 B1
8516269 Hamlet et al. Aug 2013 B1
8681671 Hui et al. Mar 2014 B1
8938792 Koeberl et al. Jan 2015 B2
8953790 Qi et al. Feb 2015 B2
20020119770 Twitchell Aug 2002 A1
20030037237 Baldwin et al. Feb 2003 A1
20030163554 Sendrowicz Aug 2003 A1
20030181203 Cheshire Sep 2003 A1
20050036469 Wentink Feb 2005 A1
20050113102 Kwon et al. May 2005 A1
20050175184 Grover et al. Aug 2005 A1
20050246533 Gentry Nov 2005 A1
20050249137 Todd et al. Nov 2005 A1
20060025180 Rajkotia et al. Feb 2006 A1
20060034233 Strutt et al. Feb 2006 A1
20060041653 Aaron Feb 2006 A1
20060135064 Cho et al. Jun 2006 A1
20060154598 Rudland et al. Jul 2006 A1
20060156390 Baugher Jul 2006 A1
20060209584 Devadas et al. Sep 2006 A1
20060212938 Suzuki Sep 2006 A1
20060245424 Ramanathan et al. Nov 2006 A1
20060268742 Chu et al. Nov 2006 A1
20060268749 Rahman et al. Nov 2006 A1
20070097895 Keshavarzian et al. May 2007 A1
20070105542 Friedman May 2007 A1
20070110024 Meier May 2007 A1
20070127421 D'Amico et al. Jun 2007 A1
20070206537 Cam-Winget et al. Sep 2007 A1
20070211654 Kim et al. Sep 2007 A1
20070211736 Sapek et al. Sep 2007 A1
20070247303 Payton Oct 2007 A1
20070280137 Bahr et al. Dec 2007 A1
20080013947 Peloso et al. Jan 2008 A1
20080095059 Chu et al. Apr 2008 A1
20080205385 Zeng et al. Aug 2008 A1
20080279155 Pratt, Jr. et al. Nov 2008 A1
20080291855 Bata et al. Nov 2008 A1
20080292105 Wan et al. Nov 2008 A1
20090067373 Kneckt et al. Mar 2009 A1
20090216349 Kwon et al. Aug 2009 A1
20090222659 Miyabayashi et al. Sep 2009 A1
20090232037 Dixit et al. Sep 2009 A1
20090274173 Wentink Nov 2009 A1
20100005294 Kostiainen et al. Jan 2010 A1
20100046439 Chen et al. Feb 2010 A1
20100100940 Reynolds Apr 2010 A1
20100141406 Jo et al. Jun 2010 A1
20100149028 Mermet et al. Jun 2010 A1
20100191968 Patil et al. Jul 2010 A1
20100202345 Jing et al. Aug 2010 A1
20100205281 Porter et al. Aug 2010 A1
20100241857 Okude et al. Sep 2010 A1
20100246460 Kholaif et al. Sep 2010 A1
20100260146 Lu Oct 2010 A1
20100262828 Brown et al. Oct 2010 A1
20110053493 Yanagihara Mar 2011 A1
20110081860 Brown et al. Apr 2011 A1
20110099368 Koh Apr 2011 A1
20110121654 Recker et al. May 2011 A1
20110128884 Reynaud et al. Jun 2011 A1
20110216695 Orth Sep 2011 A1
20120087290 Rhee et al. Apr 2012 A1
20120087292 Grimm et al. Apr 2012 A1
20120163292 Kneckt et al. Jun 2012 A1
20120195231 Fonseca et al. Aug 2012 A1
20120196534 Kasslin et al. Aug 2012 A1
20120198434 Dirstine et al. Aug 2012 A1
20120198435 Dirstine Aug 2012 A1
20120252405 Lortz et al. Oct 2012 A1
20120263072 Wu Oct 2012 A1
20130016654 Mayo et al. Jan 2013 A1
20130029685 Moshfeghi Jan 2013 A1
20130051552 Handschuh et al. Feb 2013 A1
20130064175 Pandey et al. Mar 2013 A1
20130065584 Lyon et al. Mar 2013 A1
20130067222 Munger et al. Mar 2013 A1
20130070745 Nixon et al. Mar 2013 A1
20130080765 Mohanty et al. Mar 2013 A1
20130128809 Wentink et al. May 2013 A1
20130130622 Yang et al. May 2013 A1
20130198305 Veillette Aug 2013 A1
20130215900 Jogadhenu Aug 2013 A1
20130219482 Brandt Aug 2013 A1
20130227336 Agarwal et al. Aug 2013 A1
20130242929 Gorgen Sep 2013 A1
20130279409 Dublin, III et al. Oct 2013 A1
20130279410 Dublin, III et al. Oct 2013 A1
20130301471 Brown et al. Nov 2013 A1
20140025806 Robitaille et al. Jan 2014 A1
20140044016 Rahman Feb 2014 A1
20140047260 Iijima Feb 2014 A1
20140064261 Wang et al. Mar 2014 A1
20140089912 Wang et al. Mar 2014 A1
20140108786 Kreft Apr 2014 A1
20140111234 Laackmann et al. Apr 2014 A1
20140112470 Shen et al. Apr 2014 A1
20140167912 Snyder et al. Jun 2014 A1
20140169174 Gilson Jun 2014 A1
20140189790 Mindler et al. Jul 2014 A1
20140266669 Fadell et al. Sep 2014 A1
20140337607 Peterson et al. Nov 2014 A1
20150010153 Robertson Jan 2015 A1
20150052351 Nodehi et al. Feb 2015 A1
20150058409 Wang Feb 2015 A1
20150143130 Ducharme et al. May 2015 A1
20150195692 Chow et al. Jul 2015 A1
20150242614 Scagnol et al. Aug 2015 A1
20150244481 Tyson et al. Aug 2015 A1
20150244484 Tyson et al. Aug 2015 A1
20150244565 Heydon et al. Aug 2015 A1
20150244623 Heydon et al. Aug 2015 A1
20150244648 Tyson et al. Aug 2015 A1
20150244828 Heydon Aug 2015 A1
20150245179 Jarvis et al. Aug 2015 A1
20150245203 Tyson et al. Aug 2015 A1
20150245204 Heydon Aug 2015 A1
20150245220 Williamson et al. Aug 2015 A1
20150245231 Jarvis et al. Aug 2015 A1
20150245296 Tyson et al. Aug 2015 A1
20150245351 Banerjea et al. Aug 2015 A1
20150245369 Heydon Aug 2015 A1
20150245412 Tyson et al. Aug 2015 A1
20150326444 Smith et al. Nov 2015 A1
Foreign Referenced Citations (25)
Number Date Country
102761941 Oct 2012 CN
102984798 Mar 2013 CN
1496668 Jan 2005 EP
1780951 May 2007 EP
1886450 Feb 2008 EP
2306692 Apr 2011 EP
2464125 Apr 2010 GB
2007124148 May 2007 JP
02078272 Oct 2002 WO
03026224 Mar 2003 WO
2004004230 Jan 2004 WO
WO-2004104850 Dec 2004 WO
2007013914 Feb 2007 WO
2008004102 Jan 2008 WO
2008013878 Jan 2008 WO
2009082151 Jul 2009 WO
2009088887 Jul 2009 WO
2010036885 Apr 2010 WO
2010089737 Aug 2010 WO
2011043755 Apr 2011 WO
2012064178 May 2012 WO
2013010427 Jan 2013 WO
2013028404 Feb 2013 WO
2013057666 Apr 2013 WO
2014000163 Jan 2014 WO
Non-Patent Literature Citations (19)
Entry
Search Report for DE Application 10 2014 012 258.1 mailed on Mar. 2, 2015 (12 pages).
Search Report for DE Application 10 2014 012 518.1 mailed on Feb. 27, 2015 (14 pages).
Search Report for DE Application 10 2014 012 615.3 mailed on Jan. 27, 2015 (6 pages).
Search Report for GB Application 1405790.5 mailed on Oct. 14, 2014 (5 pages).
Search Report for GB Application 1403312.0 mailed on Jun. 25, 2014 (3 pages).
Search Report for GB Application 1405786.3 mailed on Jul. 17, 2014 (3 pages).
Search Report for GB Application 1415178.1 mailed on Sep. 25, 2014 (5 pages).
Search Report for GB Application 1405797.0 mailed on Sep. 2, 2014 (3 pages).
Search Report for GB Application 1405789.7 mailed on Sep. 26, 2014 (4 pages).
Search Report for GB Application 1405797.0 mailed on Jul. 17, 2014 (4 pages).
Search Report for GB Application 1415177.3 mailed on Sep. 10, 2014 (4 pages).
Search Report for DE Application 10 2014 012 257.3 mailed on Jan. 27, 2015 (7 pages).
Search Report for DE Application 10 2014 012 616.1 mailed on Feb. 3, 2015 (6 pages).
Search Report for GB Application 1412715.3 mailed on Jan. 8, 2015 (3 pages).
Search Report for GB Application 1412722.9 mailed on Jan. 13, 2015 (6 pages).
Search Report for GB Application 1501943.3 mailed on Mar. 20, 2015 (4 pages).
Schutz K: “Trusted Platforms for Homeland Security”, Atmel white paper, Copyright 2004, pp. 1-8, http://www.atmel.com/images/doc5062.pdf.
Chiang et al., “Neighborhood-Aware Density Control in Wireless Sensor Networks,” 2008 IEEE International Conferences on Sensor Networks, Ubiquitous, and Trustworthy Computing, 8 pages.
Balachandran et al., “Adaptice Sleeping and Awakening Protocol (ASAP) for Energy Efficient Adhoc Sensor Networks,” 2005 IEEE, 7 pages.
Related Publications (1)
Number Date Country
20150245182 A1 Aug 2015 US